“Oops, All Vulnerabilities!” Hackthebox Starting Point Oopsie 2025 writeup


Oopsie: When Access Control is a Suggestion
Let’s set the scene: it’s a Friday in 2025, the world’s still spinning, and I’m jacked into the HackTheBox VPN, ready to see what fresh horrors await in the Oopsie lab. The name alone suggests someone, somewhere, made a mistake. Spoiler: they did.
Recon: Nmap, the Old Reliable
First, the ritual sacrifice to the gods of enumeration:
bash $ nmap -sV -p- 10.10.10.28
Predictably, ports 22 (SSH) and 80 (HTTP) are open148. The web server is running Apache, which is about as surprising as finding out your IoT toaster is mining crypto for someone in Belarus.
Web Fuzzing: Cookie Monster’s Revenge
A quick trip to the web interface reveals a login page. Time to dust off Burp Suite and wfuzz. I intercept the login request and notice a cookie called user
. Fuzzing that cookie value, I discover that swapping it to the admin’s ID—because why not—magically grants admin access234. Access control: implemented via the honor system.
File Upload: PHP Shells and the Art of War
Now wielding admin powers, I find a file upload function. I upload a PHP reverse shell (because if you’re not shelling, are you even hacking?) and trigger it. Netcat lights up with a shell as www-data
34.
Credential Harvesting: db.php, the Gift That Keeps Giving
A quick rummage through the web root coughs up a db.php
file, conveniently storing robert’s database password in plaintext34. Because why hash when you can hope?
Lateral Movement: Becoming Robert
Armed with new creds, I switch to user robert
. It’s almost like they wanted me to.
Privilege Escalation: SUID, CATastrophe
I enumerate SUID binaries and find /usr/bin/bugtracker
. Running it as robert
reveals it calls cat
with elevated privileges, and the PATH isn’t sanitized. I hijack cat
by dropping a malicious script in my path, then run bugtracker to read /root/root.txt
and snag the root flag34.
The Takeaway
Oopsie is a masterclass in how not to do access control, file uploads, or privilege management. If your web app trusts client-side cookies for authentication, you might as well hand out root shells as party favors. But hey, at least it’s educational—if only as a warning.
Tags
hackthebox
oopsie
bug bounty
vulnerability disclosure
privilege escalation
web security
reverse shell
CTF writeup
technopessimism
access control failure
hacking
penetration testing
The internet: it giveth, it taketh, and sometimes, it just needs to be burned down and rebuilt from the ashes of its own insecure PHP scripts.
https://bobmckay.com/i-t-support-networking/ethical-hacking/hack-the-box-walkthrough-oopsie/
https://help.hackthebox.com/en/articles/6007919-introduction-to-starting-point
https://github.com/WilsonHuha/cbr-doc/blob/master/posts/cc/Ssl_post_sort_by_time.md
https://shapmanasick.gitbook.io/starting-point-htb/oopsie-walkthrough
Subscribe to my newsletter
Read articles from Elizabeth Fallstar directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
